Security or convenience, pick one. Background: there is a difference between IDENTIFICATION and AUTHENTICATION. Identification is the equivalent of a userid. Userids are not secret. Authentication is the equivalent of a password. Passwords are secret. Many systems use biometrics like a face scan to BOTH identify a user and authenticate that it is really that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
What Does $50,000 in iPads Get You? The answer may be a prison sentence for bribery. The case is going back and forth, but now the case is back on. The head of Apple security wanted some concealed carry permits for his team and since the process wasn’t going as fast as Apple would like, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In case you have not notice, email security firm Cofense scanned emails from 35 million of its customers. Luckily, they used machine learning to do the analysis. Cofense’s report has these major conclusions: The numbers are a bit mind boggling. Among the statistics – A third of the phishing emails have a finance theme. This […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Google is very useful – we all know it. But useful for whom? Apparently hackers are setting up fake websites for popular free and open source software to promote downloads through ads and search engine marketing in Google search results. What the hackers do, among other things, is create fake domains that look like the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Why You Should Wear Contacts While on Video Conferences Researchers in Michigan and China have demonstrated their ability to read what is on your screen while you are on a video conference with 75% accuracy with text as small as 10 mm and a relatively low resolution 720 p camera. Credit: The Register Crooks are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Malware is like any other piece of software. Version one is usually pretty crappy – want vendors like to affectionately call a “minimum viable product”. Sometime minimal is loosely defined. In this case the malware is called GINP. The trojan has been in the wild since June. In the five months since, it has evolved. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]